4 * Provides the implementation for the ia32 ABI (eg prologue, epilogue, and
7 * Copyright (c) 2007 Nathan Keynes.
9 * This program is free software; you can redistribute it and/or modify
10 * it under the terms of the GNU General Public License as published by
11 * the Free Software Foundation; either version 2 of the License, or
12 * (at your option) any later version.
14 * This program is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 * GNU General Public License for more details.
20 #ifndef __lxdream_x86_64abi_H
21 #define __lxdream_x86_64abi_H 1
24 #define load_ptr( reg, ptr ) load_imm64( reg, (uint64_t)ptr );
27 * Note: clobbers EAX to make the indirect call - this isn't usually
28 * a problem since the callee will usually clobber it anyway.
31 #define CALL_FUNC0_SIZE 12
32 static inline void call_func0( void *ptr )
34 load_imm64(R_EAX, (uint64_t)ptr);
38 #define CALL_FUNC1_SIZE 14
39 static inline void call_func1( void *ptr, int arg1 )
41 MOV_r32_r32(arg1, R_EDI);
45 #define CALL_FUNC2_SIZE 16
46 static inline void call_func2( void *ptr, int arg1, int arg2 )
48 MOV_r32_r32(arg1, R_EDI);
49 MOV_r32_r32(arg2, R_ESI);
53 #define MEM_WRITE_DOUBLE_SIZE 39
55 * Write a double (64-bit) value into memory, with the first word in arg2a, and
58 static inline void MEM_WRITE_DOUBLE( int addr, int arg2a, int arg2b )
62 call_func2(sh4_write_long, addr, arg2a);
65 ADD_imm8s_r32(4, addr);
66 call_func2(sh4_write_long, addr, arg2b);
69 #define MEM_READ_DOUBLE_SIZE 43
71 * Read a double (64-bit) value from memory, writing the first word into arg2a
72 * and the second into arg2b. The addr must not be in EAX
74 static inline void MEM_READ_DOUBLE( int addr, int arg2a, int arg2b )
76 REXW(); SUB_imm8s_r32( 8, R_ESP );
78 call_func1(sh4_read_long, addr);
81 ADD_imm8s_r32(4, R_EDI);
82 call_func0(sh4_read_long);
83 MOV_r32_r32(R_EAX, arg2b);
85 REXW(); ADD_imm8s_r32( 8, R_ESP );
90 * Emit the 'start of block' assembly. Sets up the stack frame and save
93 void sh4_translate_begin_block( sh4addr_t pc )
97 load_ptr( R_EBP, &sh4r );
99 sh4_x86.in_delay_slot = FALSE;
100 sh4_x86.priv_checked = FALSE;
101 sh4_x86.fpuen_checked = FALSE;
102 sh4_x86.branch_taken = FALSE;
103 sh4_x86.backpatch_posn = 0;
104 sh4_x86.block_start_pc = pc;
105 sh4_x86.tstate = TSTATE_NONE;
109 * Exit the block with sh4r.pc already written
112 void exit_block_pcset( pc )
114 load_imm32( R_ECX, ((pc - sh4_x86.block_start_pc)>>1)*sh4_cpu_period ); // 5
115 ADD_r32_sh4r( R_ECX, REG_OFFSET(slice_cycle) ); // 6
116 load_spreg( R_EAX, REG_OFFSET(pc) );
117 call_func1(xlat_get_code,R_EAX);
122 #define EXIT_BLOCK_SIZE 35
124 * Exit the block to an absolute PC
126 void exit_block( sh4addr_t pc, sh4addr_t endpc )
128 load_imm32( R_ECX, pc ); // 5
129 store_spreg( R_ECX, REG_OFFSET(pc) ); // 3
130 REXW(); MOV_moff32_EAX( xlat_get_lut_entry(pc) );
131 REXW(); AND_imm8s_r32( 0xFC, R_EAX ); // 3
132 load_imm32( R_ECX, ((endpc - sh4_x86.block_start_pc)>>1)*sh4_cpu_period ); // 5
133 ADD_r32_sh4r( R_ECX, REG_OFFSET(slice_cycle) ); // 6
139 * Write the block trailer (exception handling block)
141 void sh4_translate_end_block( sh4addr_t pc ) {
142 if( sh4_x86.branch_taken == FALSE ) {
143 // Didn't exit unconditionally already, so write the termination here
144 exit_block( pc, pc );
146 if( sh4_x86.backpatch_posn != 0 ) {
149 uint8_t *end_ptr = xlat_output;
150 load_spreg( R_ECX, REG_OFFSET(pc) );
151 ADD_r32_r32( R_EDX, R_ECX );
152 ADD_r32_r32( R_EDX, R_ECX );
153 store_spreg( R_ECX, REG_OFFSET(pc) );
154 MOV_moff32_EAX( &sh4_cpu_period );
156 ADD_r32_sh4r( R_EAX, REG_OFFSET(slice_cycle) );
158 call_func0( sh4_raise_exception );
159 load_spreg( R_EAX, REG_OFFSET(pc) );
160 call_func1(xlat_get_code,R_EAX);
164 // Exception already raised - just cleanup
165 uint8_t *preexc_ptr = xlat_output;
166 load_imm32( R_ECX, sh4_x86.block_start_pc );
167 ADD_r32_r32( R_EDX, R_ECX );
168 ADD_r32_r32( R_EDX, R_ECX );
169 store_spreg( R_ECX, REG_OFFSET(spc) );
170 MOV_moff32_EAX( &sh4_cpu_period );
172 ADD_r32_sh4r( R_EAX, REG_OFFSET(slice_cycle) );
173 load_spreg( R_EAX, REG_OFFSET(pc) );
174 call_func1(xlat_get_code,R_EAX);
178 for( i=0; i< sh4_x86.backpatch_posn; i++ ) {
179 *sh4_x86.backpatch_list[i].fixup_addr =
180 xlat_output - ((uint8_t *)sh4_x86.backpatch_list[i].fixup_addr) - 4;
181 if( sh4_x86.backpatch_list[i].exc_code == -1 ) {
182 load_imm32( R_EDX, sh4_x86.backpatch_list[i].fixup_icount );
183 int rel = preexc_ptr - xlat_output;
186 load_imm32( R_EDI, sh4_x86.backpatch_list[i].exc_code );
187 load_imm32( R_EDX, sh4_x86.backpatch_list[i].fixup_icount );
188 int rel = end_ptr - xlat_output;
.